Abstract
In this paper, an image encryption algorithm is proposed for the first time, which uses coding deoxyribonucleic acid (DNA) sequences to transcript its complementary messenger ribonucleic acid (mRNA) sequence. A binary associative memory neural network (BAM NN) is trained to produce the required transfer ribonucleic acid (tRNA) sequences to bond with the mRNA sequences to assign the correct amino acids. DNA and mRNA sequences, together with tRNA sequences, provide the permutation and diffusion operations for the pixels in colour digital imaging and communications in medicine images. Then, keys, which are determined by the generated amino acids, are used to encrypt the diffused cipher pixels further. Also key sharing has been carried out using Universal Software Radio Peripheral (USRP), cloud infrastructure and One Time Password (OTP) generation mechanisms.The different sequence formation can also identify any alterations made by the intruder in the amino acid, which results in the wrong set of key generation. Various decryption quality analyses, statistical and differential attack analyses (namely mean square error, unified average changing intensity, peak signal-to-noise ratio, number of pixel changing rate, entropy, mean absolute error, key sensitivity, cropping attacks, and chosen-plaintext attacks), and correlation tests were carried out to confirm the robustness of the proposed algorithm.



















Similar content being viewed by others
References
Abd-El-Hafiz SK, AbdElHaleem SH, Radwan AG (2016) Novel permutation measures for image encryption algorithms. Opt Lasers Eng 85:72–83
Alam S, Hasan SMR (2017) A gene–protein–miRNA electronic oscillator. IEEE Transactions on Circuits and Systems II: Express Briefs 64(9):1007–1011
Al-Haj A (2015) Providing integrity, authenticity, and confidentiality for header and pixel data of DICOM images. J Digit Imaging 28(2):179–187
Arumugham S, Rajagopalan S, Rayappan JBB, Amirtharajan R (2018) Networked medical data sharing on secure medium-a web publishing mode for DICOM viewer with three-layer authentication. J Biomed Inform 1:2
Barani MJ, MiladYousefi VPA (2019) A new digital image tamper detection algorithm based on integer wavelet transform and secured by encrypted authentication sequence with 3D quantum map. Optik 187:205–222
Chai X, Fu X, Gan Z (2019) A color image cryptosystem based on dynamic DNA encryption and chaos. Signal Process 155:44–62
Chai X, Gan Z, Yuan K, Chen Y, Liu X (2017) A novel image encryption scheme based on DNA sequence operations and chaotic systems. Neural Comput & Applic:1–19
Chandrasekaran J, Thiruvengadam SJ, Rey D (2017) A Hybrid Chaotic and Number Theoretic Approach for Securing DICOM Images. Secur. Commun. Networks, vol. 2017, no. Article ID 6729896, p. 12 pages.
Chen W (2016) Optical multiple-image encryption using three-dimensional space. Photonics Journal IEEE 8:1–8
Diaconu AV (2016) Circular inter-intra pixels bit-level permutation and chaos-based image encryption. Inf Sci 355:314–327
Ding W, Xie Y, Wang Y (2019) Image authentication and tamper localization based on relative difference between DCT coefficient and its estimated value. Multimed Tools Appl
El Assad S, Farajallah M (2016) A new chaos-based image encryption system. Signal Process Image Commun 41:144–157
Fu C, Meng W, Zhan Y, Zhu Z, Lau FCM, Tse CK, Ma H (2013) An efficient and secure medical image protection scheme based on chaotic maps. Comput Biol Med 43(8):1000–1010
Fu C, Zhang G, Bian O, Lei W, Ma H (2014) A novel medical image protection scheme using a 3-dimensional chaotic system. PLoS One 9:e115773
Higgs PG (2000) RNA secondary structure: physical and computational aspects. Q Rev Biophys 33(3):199–253
Kocabas O, Soyata T, Aktas MK (2016) Emerging Security Mechanisms for Medical Cyber Physical Systems. IEEE/ACM Transactions on Computational Biology and Bioinformatics 13(3):401–416
Kocarev L (2001) Chaos-based cryptography: a brief overview. IEEE Circuits Syst Mag 1:6–21
Kumar M, Iqbal A, Kumar P (2016) A new RGB image encryption algorithm based on DNA encoding and elliptic curve Diffie–Hellman cryptography. Signal Process 125:187–202
Lee SH, Lee EJ, Hwang WJ, Kwon KR (2017) Reversible DNA data hiding using multiple difference expansions for DNA authentication and storage. Multimed Tools Appl 77:1–28
Leier A, Richter C, Banzhaf W, Rauhe H (2000) Cryptography with DNA binary strands. Biosystems 57:13–22
Liu P, Zhang T, Li X (2019) A new color image encryption algorithm based on DNA and spatial chaotic map. Multimed Tools Appl 78:14823–14835
Menezes AJ, Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press
Neveu M, Kim HJ, Benner SA (2013) The "strong" RNA world hypothesis: fifty years old. Astrobiology 13(4):391–403
Patel BH, Percivalle C, Ritson DJ, Duffy CD, Sutherlan JD Common origins of RNA, protein and lipid precursors in a cyanosulfidic protometabolism. Nat Chem 7(4):301–307
Praveenkumar P, Amirtharajan R, Thenmozhi K, Balaguru Rayappan JB (2015) Medical data sheet in safe havens - a tri- layer cryptic solution. Comput Biol Med 62:264–276
Praveenkumar P, Amirtharajan R, Thenmozhi K, Rayappan JBB (2016) Fusion of confusion and diffusion: a novel image encryption approach. Telecommun Syst:1–14
Premkumar R, Anand S (2019) Secured and compound 3-D chaos image encryption using hybrid mutation and crossover operator. Multimed Tools Appl 78:9577–9593
Qiang Z, Xiaopeng W (2013) RGB color image encryption method based on Lorenz chaotic system and DNA computation. IETE Tech Rev 30(5):404–409
Ravichandran D, Praveenkumar P, Balaguru Rayappan JB, Amirtharajan R (2016) Chaos based crossover and mutation for securing DICOM image. Comput Biol Med 72:170–184
Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R DNA Chaos Blend to Secure Medical Privacy. IEEE Transactions on NanoBioscience 16(8):850–858
Rehman AU, Liao XF, Kulsoom A, Abbas SA (2015) Selective encryption for gray images based on chaos and DNA complementary rules. Multimed Tools Appl 74:4655–4677
Shabash B, Wiese KC (2017) RNA Visualization: Relevance and the Current State-of-the-Art Focusing on Pseudoknots. IEEE/ACM Transactions on Computational Biology and Bioinformatics 14(3):696–712
Singh HV, Agarwal R (2018) Diagnosis of Carious Legions Using Digital Processing of Dental Radiographs. Springer, Cham, pp 864–882
Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 78:3457–3470
Tinoco I, Bustamante C (1999) How RNA folds. J Mol Biol 293(2):271–281
Wang X, Liu C (2017) A novel and effective image encryption algorithm based on chaos and DNA encoding. Multimed Tools Appl 76(5):6229–6245
Wang H, Quigley GJ, Kolpak FJ, Crawford JL, van Boom JH, Van der Marel G, Rich A (1979) Molecular structure of a left-handed double helical DNA fragment at atomic resolution. Nature 282(5740):680–686
Wang X-Y, Zhang Y-Q, Bao X-M (2015) A novel chaotic image encryption scheme using DNA sequence operations. Opt Lasers Eng 73:53–61
Watson D, Crick FHC A structure for Deoxyribose Nucleic Acid. Nature 171:737–738
Wu Y, Member S, Noonan JP, Member L (2011) NPCR and UACI randomness tests for image encryption. Cyber Journals Multidiscip Journals Sci Technol J Sel Areas Telecommun:31–38
Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP, Natarajan P (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci (Ny) 222:323–342
Zhang S, Gao T, Gao L (2014) A novel encryption frame for medical image with watermark based on hyperchaotic system. Math Probl Eng 2014
Zhang J, Huo D (2019) Image encryption algorithm based on quantum chaotic map and DNA coding. Multimed Tools Appl 78:15605–15621
Zhong C, Andrews J, Zhang S (2012) Discovering non-coding RNA elements in drosophila 3’ untranslated regions. 2012 IEEE 2nd International Conference on Computational Advances in Bio and medical Sciences (ICCABS), Las Vegas, pp. 1–6
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Devi, R.S., Aravind, A.R.N., Vishal, J.C. et al. Image encryption through RNA approach assisted with neural key sequences. Multimed Tools Appl 79, 12093–12124 (2020). https://doi.org/10.1007/s11042-019-08562-5
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-019-08562-5